WO2014120621A3 - Communication sécurisée au sein d'un réseau au moyen de la vérification de l'intégrité d'un client - Google Patents
Communication sécurisée au sein d'un réseau au moyen de la vérification de l'intégrité d'un client Download PDFInfo
- Publication number
- WO2014120621A3 WO2014120621A3 PCT/US2014/013235 US2014013235W WO2014120621A3 WO 2014120621 A3 WO2014120621 A3 WO 2014120621A3 US 2014013235 W US2014013235 W US 2014013235W WO 2014120621 A3 WO2014120621 A3 WO 2014120621A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- trust broker
- user agent
- client
- network
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/562—Brokering proxy services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/69—Types of network addresses using geographic information, e.g. room number
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
L'invention se rapporte à un procédé permettant de protéger des serveurs d'applications des attaques réseau et de vérifier la posture de sécurité de systèmes clients finals. Un système courtier de confiance reçoit, en provenance d'un agent d'utilisateur associé à un système client éloigné du courtier de confiance, une demande de connexion à des applications et des ressources associées au courtier de confiance. Le système courtier de confiance vérifie l'intégrité du système client et l'identité d'un utilisateur de ce système client. Le système courtier de confiance détermine ensuite le niveau d'accès autorisé à l'utilisateur identifié, puis il établit, sur la base de ce niveau d'accès, une connexion avec l'agent d'utilisateur, et il transmet des informations de session au système serveur. Ledit système courtier de confiance envoie à l'agent d'utilisateur des informations de connexion qui permettent à l'agent d'utilisateur demandeur de se connecter au système serveur demandé.
Applications Claiming Priority (14)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201361759963P | 2013-02-01 | 2013-02-01 | |
| US61/759,963 | 2013-02-01 | ||
| US13/794,644 US9398050B2 (en) | 2013-02-01 | 2013-03-11 | Dynamically configured connection to a trust broker |
| US13/794,607 US20140223514A1 (en) | 2013-02-01 | 2013-03-11 | Network Client Software and System Validation |
| US13/794,644 | 2013-03-11 | ||
| US13/794,574 US20140223178A1 (en) | 2013-02-01 | 2013-03-11 | Securing Communication over a Network Using User Identity Verification |
| US13/794,532 US9282120B2 (en) | 2013-02-01 | 2013-03-11 | Securing communication over a network using client integrity verification |
| US13/794,532 | 2013-03-11 | ||
| US13/794,668 | 2013-03-11 | ||
| US13/794,574 | 2013-03-11 | ||
| US13/794,607 | 2013-03-11 | ||
| US13/794,689 | 2013-03-11 | ||
| US13/794,668 US9027086B2 (en) | 2013-02-01 | 2013-03-11 | Securing organizational computing assets over a network using virtual domains |
| US13/794,689 US9065856B2 (en) | 2013-02-01 | 2013-03-11 | Securing communication over a network using client system authorization and dynamically assigned proxy servers |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2014120621A2 WO2014120621A2 (fr) | 2014-08-07 |
| WO2014120621A3 true WO2014120621A3 (fr) | 2014-12-31 |
Family
ID=51260258
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2014/013235 Ceased WO2014120621A2 (fr) | 2013-02-01 | 2014-01-27 | Communication sécurisée au sein d'un réseau au moyen de la vérification de l'intégrité d'un client |
Country Status (2)
| Country | Link |
|---|---|
| US (10) | US9282120B2 (fr) |
| WO (1) | WO2014120621A2 (fr) |
Families Citing this family (83)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8560604B2 (en) | 2009-10-08 | 2013-10-15 | Hola Networks Ltd. | System and method for providing faster and more efficient data communication |
| US9282898B2 (en) | 2012-06-25 | 2016-03-15 | Sprint Communications Company L.P. | End-to-end trusted communications infrastructure |
| US9286465B1 (en) * | 2012-12-31 | 2016-03-15 | Emc Corporation | Method and apparatus for federated single sign on using authentication broker |
| US9282120B2 (en) | 2013-02-01 | 2016-03-08 | Vidder, Inc. | Securing communication over a network using client integrity verification |
| CN104104652B (zh) * | 2013-04-03 | 2017-08-18 | 阿里巴巴集团控股有限公司 | 一种人机识别方法、网络服务接入方法及相应的设备 |
| US9853719B2 (en) * | 2013-06-09 | 2017-12-26 | Apple Inc. | Discovery of nearby devices for file transfer and other communications |
| US9088574B2 (en) * | 2013-07-18 | 2015-07-21 | International Business Machines Corporation | Subscriber identity module-based authentication of a wireless device and applications stored thereon |
| US9241044B2 (en) | 2013-08-28 | 2016-01-19 | Hola Networks, Ltd. | System and method for improving internet communication by using intermediate nodes |
| US9106620B2 (en) * | 2013-11-14 | 2015-08-11 | Comcast Cable Communications, Llc | Trusted communication session and content delivery |
| CN105590056B (zh) * | 2014-10-22 | 2019-01-18 | 中国银联股份有限公司 | 基于环境检测的动态应用功能控制方法 |
| US9954827B2 (en) * | 2014-11-03 | 2018-04-24 | Mobileframe, Llc | Invisible two-factor authentication |
| US9525707B2 (en) * | 2014-12-23 | 2016-12-20 | Mcafee, Inc. | Incident response tool using a data exchange layer system |
| US11023846B2 (en) | 2015-04-24 | 2021-06-01 | United Parcel Service Of America, Inc. | Location-based pick up and delivery services |
| US11057446B2 (en) | 2015-05-14 | 2021-07-06 | Bright Data Ltd. | System and method for streaming content from multiple servers |
| US9225711B1 (en) * | 2015-05-14 | 2015-12-29 | Fmr Llc | Transferring an authenticated session between security contexts |
| US20160364562A1 (en) * | 2015-06-09 | 2016-12-15 | Pure Storage, Inc. | Systems and methods for system self-configuration |
| US10599662B2 (en) | 2015-06-26 | 2020-03-24 | Mcafee, Llc | Query engine for remote endpoint information retrieval |
| EP3318033B1 (fr) * | 2015-06-30 | 2020-05-13 | Fujitsu Technology Solutions Intellectual Property GmbH | Procédé anti-cracking impiquant un ordinateur-relais |
| ES2828948T3 (es) * | 2015-07-02 | 2021-05-28 | Telefonica Cibersecurity & Cloud Tech S L U | Método, sistema y productos de programa informático para posibilitar de forma segura una funcionalidad en - red a lo largo de sesiones de datos cifradas |
| US9749294B1 (en) * | 2015-09-08 | 2017-08-29 | Sprint Communications Company L.P. | System and method of establishing trusted operability between networks in a network functions virtualization environment |
| GB2542175B (en) * | 2015-09-10 | 2019-12-04 | Openwave Mobility Inc | Intermediate network entity |
| US10542115B1 (en) | 2015-10-01 | 2020-01-21 | Sprint Communications Company L.P. | Securing communications in a network function virtualization (NFV) core network |
| US10110564B2 (en) * | 2015-10-14 | 2018-10-23 | Adobe Systems Incorporated | Detecting application state using a DNS-controlled proxy |
| US10623528B2 (en) | 2015-10-14 | 2020-04-14 | Adp, Llc | Enterprise application ecosystem operating system |
| US11171924B2 (en) * | 2015-10-14 | 2021-11-09 | Adp, Inc. | Customized web services gateway |
| US10348816B2 (en) | 2015-10-14 | 2019-07-09 | Adp, Llc | Dynamic proxy server |
| US9781016B1 (en) | 2015-11-02 | 2017-10-03 | Sprint Communications Company L.P. | Dynamic addition of network function services |
| US10282719B1 (en) * | 2015-11-12 | 2019-05-07 | Sprint Communications Company L.P. | Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit |
| US9817992B1 (en) | 2015-11-20 | 2017-11-14 | Sprint Communications Company Lp. | System and method for secure USIM wireless network access |
| US10594795B2 (en) * | 2015-12-31 | 2020-03-17 | Axon Enterprise, Inc. | Systems and methods for filtering messages |
| US10469262B1 (en) | 2016-01-27 | 2019-11-05 | Verizon Patent ad Licensing Inc. | Methods and systems for network security using a cryptographic firewall |
| US11017067B2 (en) * | 2016-03-18 | 2021-05-25 | Forticode Limited | Method and system for user authentication with improved security |
| US10129360B2 (en) * | 2016-03-28 | 2018-11-13 | The Boeing Company | Unified data networking across heterogeneous networks |
| CN107454050B (zh) * | 2016-06-01 | 2020-03-03 | 腾讯科技(深圳)有限公司 | 一种访问网络资源的方法及装置 |
| CN107623665A (zh) * | 2016-07-15 | 2018-01-23 | 华为技术有限公司 | 一种认证方法、设备以及系统 |
| US10250498B1 (en) | 2016-10-03 | 2019-04-02 | Sprint Communications Company L.P. | Session aggregator brokering of data stream communication |
| US10326773B2 (en) | 2016-10-07 | 2019-06-18 | International Business Machines Corporation | Ensuring the credibility of devices for global attestation |
| CN106603728B (zh) * | 2017-02-11 | 2020-03-31 | 网宿科技股份有限公司 | Https加速方法和系统、数据中心、节点服务云端 |
| US11050784B1 (en) * | 2017-03-17 | 2021-06-29 | Amazon Technologies, Inc. | Mitigating a denial-of-service attack |
| US10554480B2 (en) | 2017-05-11 | 2020-02-04 | Verizon Patent And Licensing Inc. | Systems and methods for maintaining communication links |
| US10075440B1 (en) | 2017-05-17 | 2018-09-11 | International Business Machines Corporation | Multi-party secure global attestation |
| US10499249B1 (en) | 2017-07-11 | 2019-12-03 | Sprint Communications Company L.P. | Data link layer trust signaling in communication network |
| US11095678B2 (en) * | 2017-07-12 | 2021-08-17 | The Boeing Company | Mobile security countermeasures |
| US10348488B1 (en) | 2017-08-25 | 2019-07-09 | Sprint Communications Company L.P. | Tiered distributed ledger technology (DLT) in a network function virtualization (NFV) core network |
| EP3767494B1 (fr) | 2017-08-28 | 2023-02-15 | Bright Data Ltd. | Procédé pour améliorer l'extraction de contenu par sélection de dispositifs tunnel |
| US10469482B2 (en) * | 2017-09-05 | 2019-11-05 | Masergy Communications, Inc. | Encrypted data retrieval systems and methods to provide access to encrypted data |
| US11017102B2 (en) * | 2017-09-12 | 2021-05-25 | Sophos Limited | Communicating application information to a firewall |
| FR3081654A1 (fr) * | 2018-06-22 | 2019-11-29 | Orange | Procede, dispositif et serveur de distribution securisee d'une configuration a un terminal |
| US11144620B2 (en) * | 2018-06-26 | 2021-10-12 | Counseling and Development, Inc. | Systems and methods for establishing connections in a network following secure verification of interested parties |
| CN108989329B (zh) * | 2018-08-08 | 2021-06-08 | 海南新软软件有限公司 | 一种限制用户操作的方法、装置及系统 |
| CN108989360A (zh) * | 2018-10-22 | 2018-12-11 | 上海朔羡网络科技有限公司 | 协议签署系统、方法、计算机设备及可读存储介质 |
| US11038881B2 (en) | 2018-11-01 | 2021-06-15 | Cisco Technology, Inc. | Anonymously generating an encrypted session for a client device in a wireless network |
| EP4075304B1 (fr) | 2019-02-25 | 2023-06-28 | Bright Data Ltd. | Système et procédé pour mécanisme de relance d'extraction d'url |
| BR112021016477A2 (pt) | 2019-03-06 | 2022-03-03 | Greet Solutions Llc | Sistema e método de identificação e autenticação de usuário baseada em proximidade |
| CN110324397B (zh) * | 2019-03-21 | 2021-09-21 | 国网山东省电力公司 | 基于动态连接的智能变电站站控层应用服务接口访问方法 |
| LT4027618T (lt) | 2019-04-02 | 2024-08-26 | Bright Data Ltd. | Netiesioginės url atsisiuntimo paslaugos valdymas |
| US11190489B2 (en) | 2019-06-04 | 2021-11-30 | OPSWAT, Inc. | Methods and systems for establishing a connection between a first device and a second device across a software-defined perimeter |
| US11635990B2 (en) | 2019-07-01 | 2023-04-25 | Nutanix, Inc. | Scalable centralized manager including examples of data pipeline deployment to an edge system |
| US11501881B2 (en) | 2019-07-03 | 2022-11-15 | Nutanix, Inc. | Apparatus and method for deploying a mobile device as a data source in an IoT system |
| US10491582B1 (en) * | 2019-07-19 | 2019-11-26 | Capital One Services, Llc | Message authenticated communication sessions |
| US12155731B2 (en) | 2019-10-09 | 2024-11-26 | Nutanix, Inc. | Platform-as-a-service deployment including service domains |
| CN111628987B (zh) * | 2020-05-22 | 2022-08-09 | 北京金山云网络技术有限公司 | 鉴权方法、装置、系统、电子设备及计算机可读存储介质 |
| CN111835728B (zh) * | 2020-06-15 | 2023-09-01 | 广州海颐信息安全技术有限公司 | 隐匿特权访问真实网络和协议的方法及装置 |
| CN116195231A (zh) * | 2020-10-09 | 2023-05-30 | 维萨国际服务协会 | 令牌故障保护系统和方法 |
| US12306733B2 (en) | 2020-10-21 | 2025-05-20 | Nutanix, Inc. | Key value store in a clustered containerized system |
| US12081979B2 (en) * | 2020-11-05 | 2024-09-03 | Visa International Service Association | One-time wireless authentication of an Internet-of-Things device |
| US11726764B2 (en) | 2020-11-11 | 2023-08-15 | Nutanix, Inc. | Upgrade systems for service domains |
| US11665221B2 (en) | 2020-11-13 | 2023-05-30 | Nutanix, Inc. | Common services model for multi-cloud platform |
| CN112637814A (zh) * | 2021-01-27 | 2021-04-09 | 桂林理工大学 | 一种基于信任管理的防御DDoS攻击方法 |
| CN112511569B (zh) * | 2021-02-07 | 2021-05-11 | 杭州筋斗腾云科技有限公司 | 网络资源访问请求的处理方法、系统及计算机设备 |
| US11736585B2 (en) | 2021-02-26 | 2023-08-22 | Nutanix, Inc. | Generic proxy endpoints using protocol tunnels including life cycle management and examples for distributed cloud native services and applications |
| US12210893B2 (en) * | 2021-07-29 | 2025-01-28 | Red Hat, Inc. | Establishing process connections utilizing an intermediary broker |
| US11799857B2 (en) * | 2021-08-31 | 2023-10-24 | Cisco Technology, Inc. | Software posture for zero trust access |
| US12166758B2 (en) * | 2022-03-14 | 2024-12-10 | Juniper Networks, Inc. | Closed-loop network provisioning based on network access control fingerprinting |
| US12294615B2 (en) * | 2022-06-22 | 2025-05-06 | Microsoft Technology Licensing, Llc | Using a requestor identity to enforce a security policy on a network connection that conforms to a shared-access communication protocol |
| US12244564B2 (en) | 2022-07-29 | 2025-03-04 | Microsoft Technology Licensing, Llc. | Security for computer systems |
| US12147533B2 (en) * | 2022-07-31 | 2024-11-19 | Microsoft Technology Licensing, Llc | Securely brokering access tokens to partially trusted code |
| WO2024030195A1 (fr) * | 2022-07-31 | 2024-02-08 | Microsoft Technology Licensing, Llc | Courtage sécurisé de jetons d'accès pour un code partiellement fiable |
| US20240171641A1 (en) * | 2022-11-17 | 2024-05-23 | Connectify, Inc. | Data service management of proxy devices |
| KR20240082867A (ko) * | 2022-12-02 | 2024-06-11 | 삼성전자주식회사 | 원격 서비스를 지원하는 장치 및 방법 |
| US20240236055A1 (en) * | 2023-01-05 | 2024-07-11 | Samsung Sds Co., Ltd. | Method for secure network communication and system thereof |
| US20250193223A1 (en) * | 2023-12-08 | 2025-06-12 | Shopify Inc. | Optimized resource endpoint validation |
| US12470592B2 (en) * | 2024-04-29 | 2025-11-11 | Oracle International Corporation | Methods, systems, and computer readable media for mitigating network security attacks by linking network function (NF) discovery results with subsequent messages at proxy NF |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2367725A (en) * | 2000-10-04 | 2002-04-10 | Cce Ltd | Client/server authentication |
| US20080109904A1 (en) * | 2006-11-07 | 2008-05-08 | Samsung Electronics Co., Ltd. | Apparatus and method for managing secure data |
| WO2009136795A1 (fr) * | 2008-05-05 | 2009-11-12 | Systek As | Authentification de sessions entre des clients mobiles et un serveur |
| US20120144464A1 (en) * | 2010-12-06 | 2012-06-07 | Delaram Fakhrai | Method and system for improved security |
Family Cites Families (139)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6226750B1 (en) * | 1998-01-20 | 2001-05-01 | Proact Technologies Corp. | Secure session tracking method and system for client-server environment |
| US6609153B1 (en) | 1998-12-24 | 2003-08-19 | Redback Networks Inc. | Domain isolation through virtual network machines |
| US6938057B2 (en) | 1999-05-21 | 2005-08-30 | International Business Machines Corporation | Method and apparatus for networked backup storage |
| US6687822B1 (en) * | 1999-06-11 | 2004-02-03 | Lucent Technologies Inc | Method and system for providing translation certificates |
| AU3712300A (en) * | 1999-06-11 | 2001-01-02 | Liberate Technologies | Hierarchical open security information delegation and acquisition |
| US20090094164A1 (en) * | 1999-07-09 | 2009-04-09 | Bally Gaming, Inc. | Remote access verification environment system and method |
| US7630986B1 (en) * | 1999-10-27 | 2009-12-08 | Pinpoint, Incorporated | Secure data interchange |
| US6366577B1 (en) | 1999-11-05 | 2002-04-02 | Mci Worldcom, Inc. | Method for providing IP telephony with QoS using end-to-end RSVP signaling |
| US6970930B1 (en) | 1999-11-05 | 2005-11-29 | Mci, Inc. | Method and system of providing differentiated services |
| US6721787B1 (en) * | 2000-02-10 | 2004-04-13 | 3Com Corporation | System and method for wireless hot-synchronization of a personal digital assistant |
| US7386513B2 (en) | 2001-01-17 | 2008-06-10 | Contentguard Holdings, Inc. | Networked services licensing system and method |
| US20030220880A1 (en) | 2002-01-17 | 2003-11-27 | Contentguard Holdings, Inc. | Networked services licensing system and method |
| US7131000B2 (en) | 2001-01-18 | 2006-10-31 | Bradee Robert L | Computer security system |
| US20060059544A1 (en) * | 2004-09-14 | 2006-03-16 | Guthrie Paul D | Distributed secure repository |
| US20020184507A1 (en) | 2001-05-31 | 2002-12-05 | Proact Technologies Corp. | Centralized single sign-on method and system for a client-server environment |
| GB0117429D0 (en) * | 2001-07-17 | 2001-09-12 | Trustis Ltd | Trust management |
| US20030023689A1 (en) | 2001-07-26 | 2003-01-30 | International Business Machines Corporation | Editing messaging sessions for a record |
| US7162036B2 (en) | 2001-08-06 | 2007-01-09 | Igt | Digital identification of unique game characteristics |
| US20030130960A1 (en) | 2001-11-28 | 2003-07-10 | Fraser John D. | Bridging service for security validation within enterprises |
| US7818409B2 (en) | 2002-01-22 | 2010-10-19 | Alcatel-Lucent Usa Inc. | Dynamic virtual private network system and methods |
| US7546338B2 (en) | 2002-02-25 | 2009-06-09 | Ascentive Llc | Method and system for screening remote site connections and filtering data based on a community trust assessment |
| US20100242099A1 (en) | 2002-04-05 | 2010-09-23 | Tsao Sheng Tai Ted | Method and apparatus of UI design for web-based computer user working environment |
| US8910241B2 (en) * | 2002-04-25 | 2014-12-09 | Citrix Systems, Inc. | Computer security system |
| EP1558983A4 (fr) * | 2002-10-25 | 2010-07-14 | Cambridge Interactive Dev Corp | Cle de chiffrement de mot de passe |
| US7386889B2 (en) | 2002-11-18 | 2008-06-10 | Trusted Network Technologies, Inc. | System and method for intrusion prevention in a communications network |
| US8554930B2 (en) | 2002-12-31 | 2013-10-08 | International Business Machines Corporation | Method and system for proof-of-possession operations associated with authentication assertions in a heterogeneous federated environment |
| US8561161B2 (en) | 2002-12-31 | 2013-10-15 | International Business Machines Corporation | Method and system for authentication in a heterogeneous federated environment |
| US20040128542A1 (en) * | 2002-12-31 | 2004-07-01 | International Business Machines Corporation | Method and system for native authentication protocols in a heterogeneous federated environment |
| US7428750B1 (en) | 2003-03-24 | 2008-09-23 | Microsoft Corporation | Managing multiple user identities in authentication environments |
| US20040259633A1 (en) | 2003-04-16 | 2004-12-23 | Gentles Thomas A. | Remote authentication of gaming software in a gaming system environment |
| US7591017B2 (en) * | 2003-06-24 | 2009-09-15 | Nokia Inc. | Apparatus, and method for implementing remote client integrity verification |
| US7512785B2 (en) * | 2003-07-18 | 2009-03-31 | Intel Corporation | Revocation distribution |
| US7644446B2 (en) * | 2003-10-23 | 2010-01-05 | Microsoft Corporation | Encryption and data-protection for content on portable medium |
| US7181764B2 (en) | 2003-11-04 | 2007-02-20 | Yahoo! Inc. | System and method for a subscription model trusted email database for use in antispam |
| US7155738B2 (en) | 2003-11-04 | 2006-12-26 | Yahoo! Inc. | System and method for managing a trusted email datastore |
| US20050132229A1 (en) * | 2003-11-12 | 2005-06-16 | Nokia Corporation | Virtual private network based on root-trust module computing platforms |
| US7673046B2 (en) | 2003-11-14 | 2010-03-02 | Microsoft Corporation | Trusted network transfer of content using off network input code |
| US7996631B1 (en) * | 2004-02-17 | 2011-08-09 | Oracle America, Inc. | System and method for accessing storage devices attached to a stateless client |
| US8528063B2 (en) * | 2004-03-31 | 2013-09-03 | International Business Machines Corporation | Cross domain security information conversion |
| US7607008B2 (en) | 2004-04-01 | 2009-10-20 | Microsoft Corporation | Authentication broker service |
| CA2562912A1 (fr) * | 2004-04-12 | 2005-10-27 | Xds, Inc. | Systeme et procede pour initier automatiquement et etablir dynamiquement des connexions internet securisees entre un serveur protege par un pare-feu et un client protege par un pare-feu |
| US7698375B2 (en) | 2004-07-21 | 2010-04-13 | International Business Machines Corporation | Method and system for pluggability of federation protocol runtimes for federated user lifecycle management |
| JP4707992B2 (ja) * | 2004-10-22 | 2011-06-22 | 富士通株式会社 | 暗号化通信システム |
| US8266676B2 (en) * | 2004-11-29 | 2012-09-11 | Harris Corporation | Method to verify the integrity of components on a trusted platform using integrity database services |
| US7562382B2 (en) | 2004-12-16 | 2009-07-14 | International Business Machines Corporation | Specializing support for a federation relationship |
| US20060259950A1 (en) * | 2005-02-18 | 2006-11-16 | Ulf Mattsson | Multi-layer system for privacy enforcement and monitoring of suspicious data access behavior |
| EP1856640A2 (fr) * | 2005-03-02 | 2007-11-21 | Markmonitor, Inc. | Systemes et procedes d'evaluation de confiance |
| US7650383B2 (en) | 2005-03-15 | 2010-01-19 | Aol Llc | Electronic message system with federation of trusted senders |
| US7631346B2 (en) * | 2005-04-01 | 2009-12-08 | International Business Machines Corporation | Method and system for a runtime user account creation operation within a single-sign-on process in a federated computing environment |
| US7647381B2 (en) * | 2005-04-04 | 2010-01-12 | Aol Llc | Federated challenge credit system |
| US8028329B2 (en) * | 2005-06-13 | 2011-09-27 | Iamsecureonline, Inc. | Proxy authentication network |
| EP1900170B1 (fr) | 2005-06-29 | 2017-11-15 | Telecom Italia S.p.A. | Procedure d'authentification rapide dans des reseaux de communication de donnees sans fil |
| US7739724B2 (en) | 2005-06-30 | 2010-06-15 | Intel Corporation | Techniques for authenticated posture reporting and associated enforcement of network access |
| US7542436B2 (en) * | 2005-07-22 | 2009-06-02 | The Boeing Company | Tactical cognitive-based simulation methods and systems for communication failure management in ad-hoc wireless networks |
| GB0520068D0 (en) * | 2005-10-03 | 2005-11-09 | Cancer Res Technology | av peptide ligand |
| US20070101400A1 (en) * | 2005-10-31 | 2007-05-03 | Overcow Corporation | Method of providing secure access to computer resources |
| US20110179477A1 (en) | 2005-12-09 | 2011-07-21 | Harris Corporation | System including property-based weighted trust score application tokens for access control and related methods |
| US7900046B2 (en) | 2006-01-11 | 2011-03-01 | International Business Machines Corporation | System and method for establishing mutual trust on a per-deployment basis between two software modules |
| US8382593B2 (en) * | 2006-01-20 | 2013-02-26 | Cork Group Trading Ltd. | Method and system for customizing electronic gaming machines |
| US8214634B1 (en) * | 2006-02-21 | 2012-07-03 | Adobe Systems Incorporated | Establishing trust via aggregate peer ranking |
| US7941419B2 (en) * | 2006-03-01 | 2011-05-10 | Oracle International Corporation | Suggested content with attribute parameterization |
| US8707451B2 (en) * | 2006-03-01 | 2014-04-22 | Oracle International Corporation | Search hit URL modification for secure application integration |
| US8875249B2 (en) | 2006-03-01 | 2014-10-28 | Oracle International Corporation | Minimum lifespan credentials for crawling data repositories |
| US8027982B2 (en) * | 2006-03-01 | 2011-09-27 | Oracle International Corporation | Self-service sources for secure search |
| US8214394B2 (en) | 2006-03-01 | 2012-07-03 | Oracle International Corporation | Propagating user identities in a secure federated search system |
| CN101083549A (zh) | 2006-06-02 | 2007-12-05 | 华为技术有限公司 | 一种实现vpn配置服务的方法和系统 |
| US8375430B2 (en) * | 2006-06-27 | 2013-02-12 | Intel Corporation | Roaming secure authenticated network access method and apparatus |
| US7814531B2 (en) | 2006-06-30 | 2010-10-12 | Intel Corporation | Detection of network environment for network access control |
| US20080005359A1 (en) | 2006-06-30 | 2008-01-03 | Khosravi Hormuzd M | Method and apparatus for OS independent platform based network access control |
| US8151317B2 (en) * | 2006-07-07 | 2012-04-03 | International Business Machines Corporation | Method and system for policy-based initiation of federation management |
| US7657639B2 (en) * | 2006-07-21 | 2010-02-02 | International Business Machines Corporation | Method and system for identity provider migration using federated single-sign-on operation |
| US20080034420A1 (en) * | 2006-08-01 | 2008-02-07 | Array Networks, Inc. | System and method of portal customization for a virtual private network device |
| US8689287B2 (en) | 2006-08-17 | 2014-04-01 | Northrop Grumman Systems Corporation | Federated credentialing system and method |
| US8818344B2 (en) | 2006-11-14 | 2014-08-26 | Microsoft Corporation | Secured communication via location awareness |
| US8522019B2 (en) * | 2007-02-23 | 2013-08-27 | Qualcomm Incorporated | Method and apparatus to create trust domains based on proximity |
| US8693659B2 (en) | 2007-03-09 | 2014-04-08 | Fonality, Inc. | System and method for centralized presence management of local and remote users |
| US8701010B2 (en) | 2007-03-12 | 2014-04-15 | Citrix Systems, Inc. | Systems and methods of using the refresh button to determine freshness policy |
| EP1970835A1 (fr) * | 2007-03-15 | 2008-09-17 | Lucent Technologies Inc. | Procédé et appareil de navigation web sécurisée |
| US8181246B2 (en) * | 2007-06-20 | 2012-05-15 | Imperva, Inc. | System and method for preventing web frauds committed using client-scripting attacks |
| US8170957B2 (en) * | 2007-08-08 | 2012-05-01 | Sinart Points Technology, Inc. | System and method for managing digital interactions |
| JP4852502B2 (ja) * | 2007-09-12 | 2012-01-11 | 株式会社日立製作所 | アクセスサーバ及び接続制限方法 |
| US8141139B2 (en) | 2007-11-14 | 2012-03-20 | International Business Machines Corporation | Federated single sign-on (F-SSO) request processing using a trust chain having a custom module |
| US8930244B2 (en) | 2008-01-15 | 2015-01-06 | Sciquest, Inc. | Method, medium, and system for processing requisitions |
| US8782759B2 (en) | 2008-02-11 | 2014-07-15 | International Business Machines Corporation | Identification and access control of users in a disconnected mode environment |
| US8732452B2 (en) | 2008-06-23 | 2014-05-20 | Microsoft Corporation | Secure message delivery using a trust broker |
| US8520854B2 (en) | 2008-08-28 | 2013-08-27 | Red Hat, Inc. | Sharing a secret using polynomials over polynomials |
| US7596530B1 (en) * | 2008-09-23 | 2009-09-29 | Marcelo Glasberg | Method for internet payments for content |
| US8196177B2 (en) * | 2008-10-16 | 2012-06-05 | International Business Machines Corporation | Digital rights management (DRM)-enabled policy management for a service provider in a federated environment |
| US8281379B2 (en) | 2008-11-13 | 2012-10-02 | Vasco Data Security, Inc. | Method and system for providing a federated authentication service with gradual expiration of credentials |
| US8843997B1 (en) | 2009-01-02 | 2014-09-23 | Resilient Network Systems, Inc. | Resilient trust network services |
| US8590029B2 (en) * | 2009-01-05 | 2013-11-19 | International Business Machines Corporation | Management of access authorization to web forums open to anonymous users within an organization |
| US7953793B2 (en) * | 2009-01-08 | 2011-05-31 | International Business Machines Corporation | Distributed preboot execution environment (PXE) server booting |
| US8301879B2 (en) | 2009-01-26 | 2012-10-30 | Microsoft Corporation | Conversation rights management |
| US9325721B2 (en) | 2009-03-23 | 2016-04-26 | International Business Machines Corporation | Restricting access to objects created by privileged commands |
| US8447976B2 (en) * | 2009-06-01 | 2013-05-21 | Microsoft Corporation | Business to business secure mail |
| US20100313016A1 (en) * | 2009-06-04 | 2010-12-09 | Microsoft Corporation | Transport Pipeline Decryption for Content-Scanning Agents |
| US20100313276A1 (en) | 2009-06-05 | 2010-12-09 | Microsoft Corporation | Web-Based Client for Creating and Accessing Protected Content |
| US9047458B2 (en) | 2009-06-19 | 2015-06-02 | Deviceauthority, Inc. | Network access protection |
| US8255984B1 (en) | 2009-07-01 | 2012-08-28 | Quest Software, Inc. | Single sign-on system for shared resource environments |
| CN101599901B (zh) | 2009-07-15 | 2011-06-08 | 杭州华三通信技术有限公司 | 远程接入mpls vpn的方法、系统和网关 |
| US20110047381A1 (en) | 2009-08-21 | 2011-02-24 | Board Of Regents, The University Of Texas System | Safemashups cloud trust broker |
| US8090351B2 (en) | 2009-09-01 | 2012-01-03 | Elliot Klein | Geographical location authentication method |
| US20110078775A1 (en) | 2009-09-30 | 2011-03-31 | Nokia Corporation | Method and apparatus for providing credibility information over an ad-hoc network |
| US8671155B2 (en) | 2009-10-19 | 2014-03-11 | Ios Health Systems, Inc. | System and method of employing a client side device to access local and remote data during communication distruptions |
| US8752152B2 (en) | 2009-12-14 | 2014-06-10 | Microsoft Corporation | Federated authentication for mailbox replication |
| US8793769B2 (en) | 2009-12-31 | 2014-07-29 | Cable Television Laboratories, Inc. | Zero sign-on authentication |
| GB201000288D0 (en) * | 2010-01-11 | 2010-02-24 | Scentrics Information Security | System and method of enforcing a computer policy |
| US8667593B1 (en) * | 2010-05-11 | 2014-03-04 | Re-Sec Technologies Ltd. | Methods and apparatuses for protecting against malicious software |
| US8396949B2 (en) * | 2010-06-03 | 2013-03-12 | Microsoft Corporation | Metadata driven automatic deployment of distributed server systems |
| US9602276B2 (en) * | 2010-06-11 | 2017-03-21 | Qualcomm Incorporated | Method and apparatus for virtual pairing with a group of semi-connected devices |
| US20120022928A1 (en) | 2010-07-26 | 2012-01-26 | Richard Wu | System and method for virtual resource and location-based advertisement |
| US8505083B2 (en) | 2010-09-30 | 2013-08-06 | Microsoft Corporation | Remote resources single sign on |
| US8443435B1 (en) | 2010-12-02 | 2013-05-14 | Juniper Networks, Inc. | VPN resource connectivity in large-scale enterprise networks |
| US9497184B2 (en) * | 2011-03-28 | 2016-11-15 | International Business Machines Corporation | User impersonation/delegation in a token-based authentication system |
| US20120331532A1 (en) | 2011-06-22 | 2012-12-27 | TerraWi, Inc. | Device-agnostic mobile device thin client computing methods and apparatus |
| US8903315B2 (en) * | 2011-06-29 | 2014-12-02 | Intel Corporation | Secure context-based computing |
| US20130107889A1 (en) | 2011-11-02 | 2013-05-02 | International Business Machines Corporation | Distributed Address Resolution Service for Virtualized Networks |
| US8856957B1 (en) | 2011-12-22 | 2014-10-07 | Amazon Technologies, Inc. | Federated identity broker |
| US20130219164A1 (en) * | 2011-12-29 | 2013-08-22 | Imation Corp. | Cloud-based hardware security modules |
| CN104115157B (zh) * | 2011-12-30 | 2017-03-08 | 英特尔公司 | 跨越计算机节点的可信任应用程序迁移 |
| US8769693B2 (en) | 2012-01-16 | 2014-07-01 | Microsoft Corporation | Trusted installation of a software application |
| US10257315B2 (en) | 2012-01-23 | 2019-04-09 | Facebook, Inc. | Secure proxied data retrieval from third-party services |
| US9077709B1 (en) * | 2012-01-31 | 2015-07-07 | Teradici Corporation | Method for authenticated communications incorporating intermediary appliances |
| US8990913B2 (en) * | 2012-04-17 | 2015-03-24 | At&T Mobility Ii Llc | Peer applications trust center |
| US9462081B2 (en) | 2012-04-17 | 2016-10-04 | Igt | Cloud based virtual environment validation |
| US9015812B2 (en) * | 2012-05-22 | 2015-04-21 | Hasso-Plattner-Institut Fur Softwaresystemtechnik Gmbh | Transparent control of access invoking real-time analysis of the query history |
| US20140007229A1 (en) * | 2012-06-29 | 2014-01-02 | Christopher T. Smith | System and method for identifying installed software products |
| US20140006598A1 (en) | 2012-06-29 | 2014-01-02 | Nokia Corporation | Methods, apparatuses and computer program products for facilitating dynamic origin-based domain allocation |
| US8855312B1 (en) * | 2012-06-29 | 2014-10-07 | Emc Corporation | Mobile trust broker |
| US8856887B2 (en) | 2012-07-09 | 2014-10-07 | Ping Identity Corporation | Methods and apparatus for delegated authentication token retrieval |
| US9894040B2 (en) | 2012-09-11 | 2018-02-13 | Microsoft Technology Licensing, Llc | Trust services for securing data in the cloud |
| US20140090033A1 (en) | 2012-09-21 | 2014-03-27 | Amazon Technologies, Inc. | Context Aware Content Distribution |
| US9507949B2 (en) | 2012-09-28 | 2016-11-29 | Intel Corporation | Device and methods for management and access of distributed data sources |
| US9060275B2 (en) * | 2012-10-09 | 2015-06-16 | Cellco Partnership | Interface for synchronizing automated replies between different messaging systems |
| US9363241B2 (en) * | 2012-10-31 | 2016-06-07 | Intel Corporation | Cryptographic enforcement based on mutual attestation for cloud services |
| US9282120B2 (en) * | 2013-02-01 | 2016-03-08 | Vidder, Inc. | Securing communication over a network using client integrity verification |
| CN104519036B (zh) * | 2013-09-30 | 2017-10-31 | 腾讯科技(深圳)有限公司 | 一种发送业务请求消息的方法及装置 |
| US9800460B2 (en) * | 2014-08-01 | 2017-10-24 | E.F. Johnson Company | Interoperability gateway for land mobile radio system |
| US10554480B2 (en) | 2017-05-11 | 2020-02-04 | Verizon Patent And Licensing Inc. | Systems and methods for maintaining communication links |
-
2013
- 2013-03-11 US US13/794,532 patent/US9282120B2/en active Active
- 2013-03-11 US US13/794,644 patent/US9398050B2/en active Active
- 2013-03-11 US US13/794,574 patent/US20140223178A1/en not_active Abandoned
- 2013-03-11 US US13/794,689 patent/US9065856B2/en active Active
- 2013-03-11 US US13/794,668 patent/US9027086B2/en active Active
- 2013-03-11 US US13/794,607 patent/US20140223514A1/en not_active Abandoned
-
2014
- 2014-01-27 WO PCT/US2014/013235 patent/WO2014120621A2/fr not_active Ceased
-
2015
- 2015-05-05 US US14/704,852 patent/US9692743B2/en active Active
- 2015-06-23 US US14/748,167 patent/US9648044B2/en active Active
-
2016
- 2016-01-25 US US15/005,452 patent/US9942274B2/en active Active
-
2017
- 2017-03-10 US US15/456,442 patent/US10652226B2/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2367725A (en) * | 2000-10-04 | 2002-04-10 | Cce Ltd | Client/server authentication |
| US20080109904A1 (en) * | 2006-11-07 | 2008-05-08 | Samsung Electronics Co., Ltd. | Apparatus and method for managing secure data |
| WO2009136795A1 (fr) * | 2008-05-05 | 2009-11-12 | Systek As | Authentification de sessions entre des clients mobiles et un serveur |
| US20120144464A1 (en) * | 2010-12-06 | 2012-06-07 | Delaram Fakhrai | Method and system for improved security |
Also Published As
| Publication number | Publication date |
|---|---|
| US9692743B2 (en) | 2017-06-27 |
| US9282120B2 (en) | 2016-03-08 |
| US9065856B2 (en) | 2015-06-23 |
| WO2014120621A2 (fr) | 2014-08-07 |
| US9942274B2 (en) | 2018-04-10 |
| US20140223178A1 (en) | 2014-08-07 |
| US20140222955A1 (en) | 2014-08-07 |
| US20140223514A1 (en) | 2014-08-07 |
| US20150237035A1 (en) | 2015-08-20 |
| US20160142415A1 (en) | 2016-05-19 |
| US20140223537A1 (en) | 2014-08-07 |
| US9027086B2 (en) | 2015-05-05 |
| US10652226B2 (en) | 2020-05-12 |
| US20140223515A1 (en) | 2014-08-07 |
| US20170187723A1 (en) | 2017-06-29 |
| US20160028694A1 (en) | 2016-01-28 |
| US20140223513A1 (en) | 2014-08-07 |
| US9398050B2 (en) | 2016-07-19 |
| US9648044B2 (en) | 2017-05-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2014120621A3 (fr) | Communication sécurisée au sein d'un réseau au moyen de la vérification de l'intégrité d'un client | |
| KR101708587B1 (ko) | 양방향 권한 부여 시스템, 클라이언트 및 방법 | |
| US10206099B1 (en) | Geolocation-based two-factor authentication | |
| WO2010117587A3 (fr) | Services de gestion d'identité fournis par un opérateur réseau | |
| WO2013106688A3 (fr) | Authentification de services sécurisés permettant l'informatique en nuage | |
| WO2018126029A3 (fr) | Chaînes de blocs pour la sécurisation de dispositifs ido | |
| WO2009151730A3 (fr) | Authentification pour système de gestion de contenu sécurisé distribué | |
| WO2013151851A3 (fr) | Authentification sécurisée dans un système multi-partie | |
| GB2523710A (en) | Multi-factor authentication and comprehensive login system for client-server networks | |
| WO2015023336A3 (fr) | Exécution de manière sélective d'un man dans le déchiffrement central | |
| WO2014051695A8 (fr) | Procédé pour l'authentification d'un contexte de sécurité mobile | |
| CN202737911U (zh) | 一种权限控制系统 | |
| JP2013508854A5 (fr) | ||
| HK1232356A1 (zh) | 验证系统及方法 | |
| EP4246892A3 (fr) | Procédé et système pour commander l'échange d'informations confidentielles | |
| WO2012096791A8 (fr) | Procédés et systèmes de distribution de données cryptographiques pour des destinataires authentifiés | |
| JP2016532934A5 (fr) | ||
| CN105897757B (zh) | 授权认证系统及授权认证方法 | |
| WO2015057937A8 (fr) | Procédé et système pour mettre en œuvre une authentification vidéo à deux facteurs | |
| WO2017208079A3 (fr) | Procédé et système d'amélioration de sécurité réseau | |
| WO2014182858A3 (fr) | Autorisation de transfert de contenu multimedia entre un serveur multimedia domestique et un dispositif client | |
| IN2013CH05960A (fr) | ||
| WO2012064856A3 (fr) | Procédés de réduction de latence dans des connexions de réseau et systèmes correspondants | |
| WO2017035085A9 (fr) | Système et procédé pour standards de protocoles biométriques | |
| JP2016525247A5 (fr) |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14725788 Country of ref document: EP Kind code of ref document: A2 |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 14725788 Country of ref document: EP Kind code of ref document: A2 |